... Desai1
The author is a professor in the Department of Computer Science of Concordia University, Montreal, Canada. E-mail: bcdesai@cs.concordia.ca
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... societies2
The recent denial of service attacks is one such instance of such acts.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... millennium3
Which really starts on January 1, 2001
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... concerned4
The U.S. Supreme Court has ruled that a person has no legitimate expectation of privacy in information voluntarily turned over to third parties.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... standard5
The ten points are: Accountability, Identifying purposes, Consent, Limiting collection, Limiting use, disclosure, and retention; Accuracy, Safeguards, Openness, Individual access, Challenging compliance
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
... block6
As in Canada where International trade is within Federal jurisdiction while other trade is under provincial jurisdiction.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
Dr. Bipin C. DESAI
2000-09-12